Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 30 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in beecue FastBee up to 2.1. Impacted is the function getRootElement of the file springboot/fastbee-server/sip-server/src/main/java/com/fastbee/sip/handler/req/ReqAbstractHandler.java of the component SIP Message Handler. The manipulation results in xml external entity reference. It is possible to launch the attack remotely. A high complexity level is associated with this attack. The exploitability is considered difficult. The project owner replied to the issue report: "Okay, we'll handle it as soon as possible." | |
| Title | beecue FastBee SIP Message ReqAbstractHandler.java getRootElement xml external entity reference | |
| Weaknesses | CWE-610 CWE-611 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-30T14:29:30.146Z
Reserved: 2025-12-29T09:08:25.743Z
Link: CVE-2025-15251
Updated: 2025-12-30T14:29:24.776Z
Status : Deferred
Published: 2025-12-30T14:15:53.130
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-15251
No data.
OpenCVE Enrichment
No data.